Zhenkai Zhang

Orcid: 0000-0002-7934-7773

Affiliations:
  • Clemson University, School of Computing, Clemson, SC, USA
  • Texas Tech University, Lubbock, TX, USA (former)
  • Vanderbilt University, Nashville, TN, USA (former, PhD)


According to our database1, Zhenkai Zhang authored at least 47 papers between 2011 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
FanBleed: Stealing Your Secrets via Observing Your Cooling Fan.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2025

2024
Caching Aided Multi-Tenant Serverless Computing.
CoRR, 2024

Invalidate+Compare: A Timer-Free GPU Cache Attack Primitive.
Proceedings of the 33rd USENIX Security Symposium, 2024

GPU Memory Exploitation for Fun and Profit.
Proceedings of the 33rd USENIX Security Symposium, 2024

DeepVenom: Persistent DNN Backdoors Exploiting Transient Weight Perturbations in Memories.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

FreeEM: Uncovering Parallel Memory EMR Covert Communication in Volatile Environments.
Proceedings of the 22nd Annual International Conference on Mobile Systems, 2024

WBP: Training-Time Backdoor Attacks Through Hardware-Based Weight Bit Poisoning.
Proceedings of the Computer Vision - ECCV 2024, 2024

Toward Understanding the Security of Plugins in Continuous Integration Services.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

PowSpectre: Powering Up Speculation Attacks with TSX-based Replay.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
mmFingerprint: A New Application Fingerprinting Technique via mmWave Sensing and Its Use in Rowhammer Detection.
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023

BeKnight: Guarding Against Information Leakage in Speculatively Updated Branch Predictors.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

TunneLs for Bootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Moving target defense for the security and resilience of mixed time and event triggered cyber-physical systems.
J. Syst. Archit., 2022

A High-Speed, Long-Distance and Wall-Penetrating Covert Channel Based on EM Emanations from DRAM Clock.
J. Hardw. Syst. Secur., 2022

Data space randomization for securing cyber-physical systems.
Int. J. Inf. Sec., 2022

Open Set Recognition using Vision Transformer with an Additional Detection Head.
CoRR, 2022

Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Clairvoyance: Exploiting Far-field EM Emanations of GPU to "See" Your DNN Models through Obstacles at a Distance.
Proceedings of the 43rd IEEE Security and Privacy, 2022

A Vision Transformer Architecture for Open Set Recognition.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

On the Feasibility of Training-time Trojan Attacks through Hardware-based Faults in Memory.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2022

LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

CSDLEEG: Identifying Confused Students Based on EEG Using Multi-View Deep Learning.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
Seeds of SEED: NMT-Stroke: Diverting Neural Machine Translation through Hardware-based Faults.
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021

OnlineDC: Leveraging Temporal Driving Behavior to Facilitate Driver Classification.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Red Alert for Power Leakage: Exploiting Intel RAPL-Induced Side Channels.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Integrated moving target defense and control reconfiguration for securing Cyber-Physical systems.
Microprocess. Microsystems, 2020

Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Security in Mixed Time and Event Triggered Cyber-Physical Systems using Moving Target Defense.
Proceedings of the 23rd IEEE International Symposium on Real-Time Distributed Computing, 2020

BitJabber: The World's Fastest Electromagnetic Covert Channel.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020

2019
A model-based design approach for simulation and virtual prototyping of automotive control systems using port-Hamiltonian systems.
Softw. Syst. Model., 2019

Dynamic symbolic execution for the analysis of web server applications in Java.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Integrated data space randomization and control reconfiguration for securing cyber-physical systems.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

2018
Integrated instruction set randomization and control reconfiguration for securing cyber-physical systems.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

Triggering Rowhammer Hardware Faults on ARM: A Revisit.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

2017
Integrating Cache-Related Preemption Delay into GEDF Analysis for Multiprocessor Scheduling with On-chip Cache.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Work-in-Progress: Cache-Aware Partitioned EDF Scheduling for Multi-core Real-Time Systems.
Proceedings of the 2017 IEEE Real-Time Systems Symposium, 2017

Handling write backs in multi-level cache analysis for WCET estimation.
Proceedings of the 25th International Conference on Real-Time Networks and Systems, 2017

2016
Cache-related preemption delay analysis for multi-level inclusive caches.
Proceedings of the 2016 International Conference on Embedded Software, 2016

2015
Analysis and Verification of Cyber-Physical System Software Using Static Analysis.
PhD thesis, 2015

Precise Multi-level Inclusive Cache Analysis for WCET Estimation.
Proceedings of the 2015 IEEE Real-Time Systems Symposium, 2015

Top-down and bottom-up multi-level cache analysis for WCET estimation.
Proceedings of the 21st IEEE Real-Time and Embedded Technology and Applications Symposium, 2015

Improving the Precision of Abstract Interpretation Based Cache Persistence Analysis.
Proceedings of the 16th ACM SIGPLAN/SIGBED Conference on Languages, 2015

2014
A co-simulation framework for design of time-triggered automotive cyber physical systems.
Simul. Model. Pract. Theory, 2014

2013
A case study on the model-based design and integration of automotive cyber-physical systems.
Proceedings of the 21st Mediterranean Conference on Control and Automation, 2013

Modeling Time-Triggered Ethernet in SystemC/TLM for Virtual Prototyping of Cyber-Physical Systems.
Proceedings of the Embedded Systems: Design, Analysis and Verification, 2013

Co-simulation framework for design of time-triggered cyber physical systems.
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013

2011
High confidence embedded software design: a quadrotor helicopter case study.
SIGBED Rev., 2011


  Loading...